Most of us have heard of ‘stranger danger’ and most of us have been educated as children or have educated children about...
Short Bytes: RedMonk’s bi-annual programming language ranking is out and it shows that JavaSript continues to rule the web. Also, Apple’s Swift...
Hackers are stealing eBay usernames and passwords by hosting phishing sites on eBay’s very own network. These sites appear convincing because of the...
Short Bytes: Security firm Proofpoint has noticed some instances of a new ATM malware called GreenDispenser. Hackers can empty the whole ATM...
Windows doesn’t provide a built in tool , through which you can check your S.M.A.R.T Data. You will have to use a...
Facebook has finally improved its AI mechanism and unveiled its personal digital assistant that enhances your video watching experience tremendously. According to...
Uber’s tentative and troublesome entry into the Chinese market has been compounded by news that Hacked Uber Accounts of Uber Riders are...
Largest Chat app for Smartphones is now at Risk whatsapp hack that allow user to steal conversation, Israeli security firm Check Point discovered...
Simple e-mail exploit lets microconsole play dozens more games. When we gave our impressions of Sony’s Vita-based PlayStation TV microconsole last year,...
Compromised WordPress websites are delivering spyware and PUAs (potentially unwanted applications) to users via fake Flash update messages and fake browser plugins....
Yahoo’s developers have open-sourced Gryffin, a security scanner for Web content, specifically designed to cut down the number of false positives and...
In case didn’t know or need a reminder, browser cookies aren’t exactly impervious to attack. The DHS-sponsored CERT at the Software Engineering...
Once again, fully patched iPhone lock screens can be bypassed with a few keystrokes. iPhone users have yet another screenlock bypass vulnerability...
Short Bytes: Docker images, Docker containers, Docker Hub, Compose, Machine, Swarm etc. are frequently used terms when working with Docker. In this article,...
Short Bytes: We have made a short collection of the compatible apps that give a sense of what’s possible with the new...
Short Bytes: Want to learn to code in C and C++? Read our guide to know about the best places to learn...
Now you cannot test your IQ without getting your mobile compromised — The malicious new Android app has already infected more than...
Security firm Malwarebytes says a campaign of malware hidden inside online ads which hit search engine Yahoo earlier this year has now...
Children as young as five are surfing the web on a daily basis, but are parents doing enough to educate them on...
Symantec’s researchers have discovered a new version of the Kovter trojan, which now mimics the Poweliks malware and is able to live...
The GreenDispenser malware displays an error on the infected ATMs so that only criminals can use them. Security researchers have discovered a...